You are on page 1of 6

Security Part II: Auditing Database System

Final Examination
Prepared by: Anna Roneliza M. Cena

NAME: _____________________________________________________________

1. Which of the following is not a primary element of Database Environment?


a.) DBMS Models
b.) Physical Database
c.) Database Administrator
d.) Legacy System

2. This is the data files that contain records with no structured relationships to other files.
a.) Flat-File Approach
b.) Database Approach
c.) Legacy System
d.) Data Redundancy

3. This is the replication of essentially the same data in multiple files.


a.) Data Redundancy
b.) Data Storage
c.) Data Updating
d.) Data View

4. This approach centralizes the organizations data into a common database that is
shared by other users.
a.) Flat-File Approach
b.) Database Approach
c.) Data Definition Language
d.) Partitioned database approach

5. This is a programming language used to define the database to the DBMS.


a.) Data structure
b.) Query
c.) Data Manipulation Language
d.) Data definition Language

6. This is the proprietary programming language that a particular DBMS uses to retrieve,
process, and store data.
a.) Data Manipulation Language
b.) Data Definition Language
c.) IBMs structured Query Language
d.) Database Administrator

7. This is to ensure that in the event of data lose due to unauthorized access, equipment
failure, or physical disaster the organization can recover its database.
a.) Access control
b.) Backup control
c.) Data control
d.) Biometric control

8. This is to allows the user to create a personal security program or routine to provide
more positive user identification than a single password.
a.) Recovery module
b.) Checkpoint Facility
c.) User-defined procedure
d.) Database authorization table

9. This is a permanent condition that must be resolved by special software that analyzes
each deadlock condition to determine the best solution, can result in transactions being
incompletely processed and the database being corrupted.
a.) The network Model
b.) Record Type
c.) Navigational Database
d.) Deadlock

10. It is an ad hoc access methodology for extracting information from a database.


a.) Query
b.) Table
c.) Control
d.) Data
Security Part II: Auditing Database System
Final Examination
Prepared by: Anna Roneliza M. Cena

NAME: _____________________________________________________________

1. Which of the following is not a primary element of Database Environment?


a.) DBMS Models
b.) Physical Database
c.) Database Administrator
d.) Legacy System

2. This is the data files that contain records with no structured relationships to other files.
a.) Flat-File Approach
b.) Database Approach
c.) Legacy System
d.) Data Redundancy

3. This is the replication of essentially the same data in multiple files.


a.) Data Redundancy
b.) Data Storage
c.) Data Updating
d.) Data View

4. This approach centralizes the organizations data into a common database that is
shared by other users.
a.) Flat-File Approach
b.) Database Approach
c.) Data Definition Language
d.) Partitioned database approach

5. This is a programming language used to define the database to the DBMS.


a.) Data structure
b.) Query
c.) Data Manipulation Language
d.) Data definition Language

6. This is the proprietary programming language that a particular DBMS uses to retrieve,
process, and store data.
a.) Data Manipulation Language
b.) Data Definition Language
c.) IBMs structured Query Language
d.) Database Administrator

7. This is to ensure that in the event of data lose due to unauthorized access, equipment
failure, or physical disaster the organization can recover its database.
a.) Access control
b.) Backup control
c.) Data control
d.) Biometric control

8. This is to allows the user to create a personal security program or routine to provide
more positive user identification than a single password.
a.) Recovery module
b.) Checkpoint Facility
c.) User-defined procedure
d.) Database authorization table
9. This is a permanent condition that must be resolved by special software that analyzes
each deadlock condition to determine the best solution, can result in transactions being
incompletely processed and the database being corrupted.
a.) The network Model
b.) Record Type
c.) Navigational Database
d.) Deadlock

10. It is an ad hoc access methodology for extracting information from a database.


a.) Query
b.) Table
c.) Control
d.) Data

CHAPTER 4: ANSWER KEY


1. D 10. A
2. A
3. A
4. B
5. D
6. A
7. B
8. C
9. D

You might also like